Academy Login

Weekly CISSP Practice

Exam Questions

Week 9 - Question 2

Question:  Which of the following best describes a Red Team?

A. Internal security team

B.  External auditors

C.  Internal or external team mimicking attackers

D.  Forensic experts

 

Correct Answer:  C

Explanation:

A. Internal Security Team
An internal security team is generally referred to as the Blue Team.

The Role: Their day-to-day job involves "defensive" operations: monitoring logs, maintaining firewalls, patching systems, and responding to incidents.

The Distinction: While a Red Team can be made up of internal employees (if the organization is large enough), their role is strictly adversarial. Calling a Red Team simply an "internal security team" is imprecise because most internal teams are focused on defense and maintenance, not offensive simulation.

B. External Auditors
Auditors are focused on Compliance and Verification.

The Process: An auditor checks if the organization is following its own policies or meeting regulatory standards (like ISO 27001 or SOC2). They use checklists, interviews, and documentation reviews.

The Contrast: Unlike a Red Team, auditors do not try to "break in" or bypass controls using stealth. They are there to verify that controls are present, while a Red Team is there to prove those controls can be defeated.

C. Internal or External Team Mimicking Attackers
A Red Team exercise is a full-scope, multi-layered attack simulation designed to measure how well an organization's people and processes stand up to a real-world adversary.

Objective-Based: Unlike a standard penetration test (which looks for as many vulnerabilities as possible), a Red Team often has a specific goal, such as "infiltrate the CFO’s laptop" or "exfiltrate the customer database."

TTPs: They use Tactics, Techniques, and Procedures (TTPs) that mirror actual threat actors, including social engineering, physical tailgating, and stealthy lateral movement.

The Surprise Element: A true Red Team exercise is often "unannounced," meaning the Blue Team (defenders) does not know a test is happening. This tests the organization's detection and response capabilities under realistic stress.

D. Forensic Experts
Forensic experts (Digital Forensics and Incident Response - DFIR) are Reactive.

The Timeline: They enter the scene after a breach has been detected. Their goal is to preserve evidence, determine the timeline of the attack, and support legal or insurance claims.

No Simulation: Forensic experts do not mimic attackers; they study the digital "fingerprints" left behind by attackers. While a Red Team exercise might eventually involve a forensic review of the "attack," the experts themselves are not the ones performing the offensive simulation.

Key Takeaway for the CISSP Exam

The Security Color Wheel:

  • Red Team: The Adversary (Offense). Aim: Challenge the defense.
  • Blue Team: The Defenders (Defense). Aim: Protect, detect, and respond.
  • Purple Team: The Collaborative Layer. Aim: Ensure Red and Blue teams share knowledge to improve the overall security posture.
  • White Team: The Referees. Aim: Manage the exercise, set the rules, and ensure safety.

Podcasts

Check out my weekly podcasts that delve deep into the relevant topics related to each of CISSP domains. In addition, I will go over specific questions and they can be interpreted and answered.

Listen Podcasts

CISSP Cyber Training Academy

Tired of not knowing how to study for the CISSP Exam? 

Check out the CISSP Cyber Training Academy to help you on your journey!

Learn about the Academy!

CISSP Cyber Training - YouTube

Check out my video collection on YouTube discussing all the details needed to help you pass the CISSP exam.   

Check out channel